<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Security Management ISO/IEC 27001: 2013 &#8211; Renad AL Majed For Training</title>
	<atom:link href="https://training.rmg-sa.com/Course-category/iso-training/information-security-management-iso-iec-27001-2013/feed/" rel="self" type="application/rss+xml" />
	<link>https://training.rmg-sa.com</link>
	<description>Training Courses</description>
	<lastBuildDate>Mon, 23 Dec 2024 10:27:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://training.rmg-sa.com/wp-content/uploads/2020/08/cropped-cropped-logo-1-1-32x32.png</url>
	<title>Information Security Management ISO/IEC 27001: 2013 &#8211; Renad AL Majed For Training</title>
	<link>https://training.rmg-sa.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>ISO 27001:2013 Information Security Risk Management Training</title>
		<link>https://training.rmg-sa.com/product/iso-270012013-information-security-risk-management-training/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 20:09:14 +0000</pubDate>
				<guid isPermaLink="false">http://mashalib.com/?post_type=product&#038;p=6528</guid>

					<description><![CDATA[With the increasing number of internal and external information security threats, organizations recognize the importance of adopting a formal risk management programme. Without a mechanism to identify, analyse and manage information security risks, it’s difficult for organizations to prioritize their security remediation efforts and resource allocation and associated costs. This leaves organizations more susceptible to security breaches, which can lead to financial and reputational damage.Building on the concepts and framework specified in ISO/IEC 27001, ISO/IEC 27005:2018 provides guidelines for adopting an information security risk management approach that is appropriate to all organizations.This course aims to provide you with clear and practical guidance on the framework and steps involved to identify, analyse and manage information security risks. It will help you to review your existing risk treatments and controls and ensure they are appropriate to manage and reduce the identified risks. This will give you the confidence to get the most effective allocation of resources in place to address information security issues for your organization.]]></description>
										<content:encoded><![CDATA[With the increasing number of internal and external information security threats, organizations recognize the importance of adopting a formal risk management programme. Without a mechanism to identify, analyse and manage information security risks, it’s difficult for organizations to prioritize their security remediation efforts and resource allocation and associated costs. This leaves organizations more susceptible to security breaches, which can lead to financial and reputational damage.Building on the concepts and framework specified in ISO/IEC 27001, ISO/IEC 27005:2018 provides guidelines for adopting an information security risk management approach that is appropriate to all organizations.This course aims to provide you with clear and practical guidance on the framework and steps involved to identify, analyse and manage information security risks. It will help you to review your existing risk treatments and controls and ensure they are appropriate to manage and reduce the identified risks. This will give you the confidence to get the most effective allocation of resources in place to address information security issues for your organization.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ISO 27001:2013 Information Security Management Lead Implementer Training</title>
		<link>https://training.rmg-sa.com/product/iso-270012013-information-security-management-lead-implementer-training/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 20:09:14 +0000</pubDate>
				<guid isPermaLink="false">http://mashalib.com/?post_type=product&#038;p=6529</guid>

					<description><![CDATA[In this five day course, our experienced tutors teach you how to set up an ISMS that conforms to SO/IEC 27001:2013 in an organization.You will cover the requirements of the standard and consider the state of your organization’s current information security management practices in preparation to put in an ISMS.We will help you develop your skills and understanding of the practicalities involved when setting up a typical management system framework that conforms with the standard. This includes learning how to set up policies, processes and procedures for your ISMS.Additionally, you will also focus on developing your project management ability to lead a team with the implementation of an ISMS in your business. This can be crucial if your ISMS will need to scale throughout your organization. After attending the course and passing the examination, you will be able to play a pivotal role in ensuring your organization can set up an ISMS that is compliant to ISO/IEC 27001:2013.]]></description>
										<content:encoded><![CDATA[In this five day course, our experienced tutors teach you how to set up an ISMS that conforms to SO/IEC 27001:2013 in an organization.You will cover the requirements of the standard and consider the state of your organization’s current information security management practices in preparation to put in an ISMS.We will help you develop your skills and understanding of the practicalities involved when setting up a typical management system framework that conforms with the standard. This includes learning how to set up policies, processes and procedures for your ISMS.Additionally, you will also focus on developing your project management ability to lead a team with the implementation of an ISMS in your business. This can be crucial if your ISMS will need to scale throughout your organization. After attending the course and passing the examination, you will be able to play a pivotal role in ensuring your organization can set up an ISMS that is compliant to ISO/IEC 27001:2013.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ISO 27001:2013 Information Security Management Internal Auditor Training</title>
		<link>https://training.rmg-sa.com/product/iso-270012013-information-security-management-internal-auditor-training/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 20:07:06 +0000</pubDate>
				<guid isPermaLink="false">http://mashalib.com/?post_type=product&#038;p=6526</guid>

					<description><![CDATA[Our expert tutors will teach you how to plan, execute and report on an audit of an ISMS in an organization assessing its conformance with ISO/IEC 27001:2013.You should already have a good understanding of the requirements of the current standard, and our tutors will expand on your existing knowledge to help you develop the specialized skill and expertise to conduct an internal audit.We’ll show you how to manage the entire process end-to-end from initiating an audit to reporting on the assessment and conducting a follow-up.Your learning will rapidly develop using a balance of theory and practical activity, so that you can apply your knowledge effectively during an audit.]]></description>
										<content:encoded><![CDATA[Our expert tutors will teach you how to plan, execute and report on an audit of an ISMS in an organization assessing its conformance with ISO/IEC 27001:2013.You should already have a good understanding of the requirements of the current standard, and our tutors will expand on your existing knowledge to help you develop the specialized skill and expertise to conduct an internal audit.We’ll show you how to manage the entire process end-to-end from initiating an audit to reporting on the assessment and conducting a follow-up.Your learning will rapidly develop using a balance of theory and practical activity, so that you can apply your knowledge effectively during an audit.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ISO 27001:2013 Information Security Management Lead Auditor Training</title>
		<link>https://training.rmg-sa.com/product/iso-270012013-information-security-management-lead-auditor-training/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 20:07:06 +0000</pubDate>
				<guid isPermaLink="false">http://mashalib.com/?post_type=product&#038;p=6527</guid>

					<description><![CDATA[In this five day course our experienced tutors will teach you how to lead, plan, execute and report on an audit of an ISMS in an organization assessing its conformance with ISO/IEC 27001:2013.To attend this course, you should already have knowledge of the key Plan-Do-Check-Act (PDCA) cycle within management systems.You should also have knowledge of Information Security Management principles, concepts and specifically the requirements of ISO/IEC 27001:2013.Tutors on our lead auditor courses will expand on your existing knowledge of the standard and develop your skills and ability to lead a team to conduct audits of a system to the standard.Through a combination of tutorials, syndicate exercises and role play, you will learn everything you need to know about how an Information Security Management System audit should be run including conducting second and third-party audits.]]></description>
										<content:encoded><![CDATA[In this five day course our experienced tutors will teach you how to lead, plan, execute and report on an audit of an ISMS in an organization assessing its conformance with ISO/IEC 27001:2013.To attend this course, you should already have knowledge of the key Plan-Do-Check-Act (PDCA) cycle within management systems.You should also have knowledge of Information Security Management principles, concepts and specifically the requirements of ISO/IEC 27001:2013.Tutors on our lead auditor courses will expand on your existing knowledge of the standard and develop your skills and ability to lead a team to conduct audits of a system to the standard.Through a combination of tutorials, syndicate exercises and role play, you will learn everything you need to know about how an Information Security Management System audit should be run including conducting second and third-party audits.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ISO 27001:2013 Information Security Management Implementer Training</title>
		<link>https://training.rmg-sa.com/product/iso-270012013-information-security-management-implementer-training/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 20:07:05 +0000</pubDate>
				<guid isPermaLink="false">http://mashalib.com/?post_type=product&#038;p=6525</guid>

					<description><![CDATA[In this three day training course, our experienced tutors teach you how to consider the state of your organization’s current information security management practices in preparation to put in an ISMS.You should already have a good understanding of the requirements of the current standard and our tutors will tap into that knowledge so that you can develop your skill and understanding of the practicalities involved when setting up a typical management system framework that conforms with ISO/IEC 27001:2013.This will enable you to play a key role in ensuring your organization is compliant to ISO/IEC 27001:2013.ISO/IEC 27001:2013 provides the model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an ISMS to protect your information assets.After attending this course, you will be in a position to use this model and be able to develop an ISMS suitably appropriate for your organization.]]></description>
										<content:encoded><![CDATA[In this three day training course, our experienced tutors teach you how to consider the state of your organization’s current information security management practices in preparation to put in an ISMS.You should already have a good understanding of the requirements of the current standard and our tutors will tap into that knowledge so that you can develop your skill and understanding of the practicalities involved when setting up a typical management system framework that conforms with ISO/IEC 27001:2013.This will enable you to play a key role in ensuring your organization is compliant to ISO/IEC 27001:2013.ISO/IEC 27001:2013 provides the model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an ISMS to protect your information assets.After attending this course, you will be in a position to use this model and be able to develop an ISMS suitably appropriate for your organization.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ISO 27001:2013 Information Security Management Requirements Training</title>
		<link>https://training.rmg-sa.com/product/iso-270012013-information-security-management-requirements-training/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 26 Sep 2020 19:58:17 +0000</pubDate>
				<guid isPermaLink="false">http://mashalib.com/?post_type=product&#038;p=6519</guid>

					<description><![CDATA[Our expert tutors will explain the requirements of ISO/IEC 27001:2013 to help you understand how it could apply to your organization and the potential benefits of adopting it.You will therefore be better prepared to carry out an implementation of an ISMS that conforms to the current standard, as the background, updated concepts, principles, terms and definitions used in ISO/IEC 27001:2013 are fully explained and discussed.The requirements course will also help you understand how the standard works in preparation for attending the internal and lead auditing training courses.]]></description>
										<content:encoded><![CDATA[Our expert tutors will explain the requirements of ISO/IEC 27001:2013 to help you understand how it could apply to your organization and the potential benefits of adopting it.You will therefore be better prepared to carry out an implementation of an ISMS that conforms to the current standard, as the background, updated concepts, principles, terms and definitions used in ISO/IEC 27001:2013 are fully explained and discussed.The requirements course will also help you understand how the standard works in preparation for attending the internal and lead auditing training courses.]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
